Defensive programming: Difference between revisions

Content deleted Content added
mNo edit summary
Note that the techniques below are ''not'' sufficient to ensure security: see the articles computer security, computer insecurity and secure computing for more information.
Line 1:
Here are some hints on codingdefensive programming techniques to avoid creating security problems.
Many of these techniques also improve general quality of code, because almost any major bug can be potentially used by a [[cracker]]
for a [[Denial of Service]] or other attack.
 
Note that the techniques below are ''not'' sufficient to ensure security: see the articles [[computer security]], [[computer insecurity]] and [[secure computing]] for more information.
 
<i>Please expand this article. These random notes should be changed to a more coherent article.</i>